× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d999209894af106c0243313516a67e193de21cbc58c89de6889f6004f1eabd28
File name: Framework.apk
Detection ratio: 35 / 56
Analysis date: 2015-07-10 05:42:39 UTC ( 3 years, 4 months ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20150710
AegisLab SUSPICIOUS 20150709
AhnLab-V3 Android-Spyware/Androrat.2f84 20150709
Alibaba A.L.Rog.Androrat 20150710
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Climap.1 20150709
Arcabit Android.Riskware.AndroRat.A 20150710
Avast Android:Androrat-I [Trj] 20150710
AVG Android/SpyAgent 20150710
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20150710
AVware Trojan.AndroidOS.Generic.A 20150710
Baidu-International Trojan.Android.AndroRAT.D 20150709
BitDefender Android.Riskware.AndroRat.A 20150710
CAT-QuickHeal Android.AndroRAT.A (PUP) 20150710
ClamAV Andr.Trojan.Androrat 20150710
Cyren AndroidOS/AndroRAT.A 20150710
DrWeb Program.Androrat.1.origin 20150710
ESET-NOD32 a variant of Android/Spy.AndroRAT.D 20150710
F-Prot AndroidOS/AndroRAT.A 20150710
F-Secure Monitoring-Tool:Android/AndroRat.B 20150710
Fortinet Android/AndroRat.A!tr 20150710
GData Android.Riskware.AndroRat.A 20150710
Ikarus Trojan-Spy.AndroidOS.Androrat 20150710
K7GW Trojan ( 0048d4dc1 ) 20150710
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20150710
McAfee Artemis!85451B4BD714 20150710
McAfee-GW-Edition Artemis!PUP 20150710
Microsoft MonitoringTool:AndroidOS/AndroRat 20150710
eScan Android.Riskware.AndroRat.A 20150710
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20150710
Qihoo-360 Win32/Trojan.794 20150710
Rising NORMAL:Backdoor.Android.Climap.a!1616537 20150709
Sophos AV Andr/AndroRat-C 20150710
Tencent a.privacy.emial.d.[????] 20150710
VIPRE Trojan.AndroidOS.Generic.A 20150710
Zillya Trojan.AndroRAT..184 20150710
Yandex 20150709
ALYac 20150710
Bkav 20150708
ByteHero 20150710
Comodo 20150710
Emsisoft 20150710
Jiangmin 20150709
K7AntiVirus 20150709
Kingsoft 20150710
Malwarebytes 20150710
nProtect 20150709
Panda 20150709
SUPERAntiSpyware 20150710
Symantec 20150710
TheHacker 20150709
TotalDefense 20150709
TrendMicro 20150710
TrendMicro-HouseCall 20150709
VBA32 20150708
ViRobot 20150710
Zoner 20150710
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Risk summary
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECORD_AUDIO (record audio)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Permission-related API calls
ACCESS_NETWORK_STATE
RECORD_AUDIO
SEND_SMS
VIBRATE
CAMERA
INTERNET
READ_CONTACTS
READ_PHONE_STATE
ACCESS_FINE_LOCATION
Main Activity
my.app.client.LauncherActivity
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118704
Highest datetime
2015-06-16 14:14:08
Lowest datetime
2015-06-16 14:14:08
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 85451b4bd7140b821eb8f581c20b689d
SHA1 ff161feb9ff6bae0ba64a40280d278050f2e9848
SHA256 d999209894af106c0243313516a67e193de21cbc58c89de6889f6004f1eabd28
ssdeep
1536:q3HGMQjfKWKIE0EKVwRQjM+Zja9XLcmInzK53Lb6FR:GmMQjfXKLu4BLcmk+p6v

File size 67.0 KB ( 68653 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-06-16 15:53:47 UTC ( 3 years, 5 months ago )
Last submission 2015-06-16 15:53:47 UTC ( 3 years, 5 months ago )
File names Framework.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.